5 Necessities for a Successful Cyber Security Journey
As I reflect on my career over the past 12+ years, starting as a traditional forensic analyst, then moving ...
Other content in this Stream
Report from the Trenches: Defending against Targeted Spear Phishing Attacks
Spear Phishingnoun The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information."spear...
New Passive Monitoring capabilities for Industrial Defender ASM® Launch today!
Leidos has just enhanced its Industrial Defender ASM® to support passive monitoring of ICS assets, now combining market leading active monitoring with full passive monitoring support. Adding...
Asset Visibility: Key to an Effective ICS Security Strategy
With their proprietary control protocols and use of specialized hardware and software, early industrial control systems (ICS) had little resemblance to traditional information technology (IT) systems.
Managed Detection & Response Solutions Respond to Need for Incident Prevention
Cyber attacks are rising faster than ever, resulting in malicious threats infiltrating corporate networks and just about anything technology based.
Building a healthy connection between technology and people: An interview with Jon Scholl
The Leidos Health group president discusses how the company is taking the lead in health care technology, and what’s next for the industry overall.
Leidos named strong performer in the Forrester Wave: Information Security Consulting Services, Q3 2017
The Forrester Wave™: Information Security Consulting Services, Q3 2017, evaluates 15 global cybersecurity services firms to help security and risk professionals make the right choice.
The Cyber Workforce, Part 5: What does success look like?
Over the course of this series, we've discussed the need for more cybersecurity professionals and how we must look for new talent to build dynamic teams. But what does success look like?
Securing critical infrastructure organizations against the next cyber breach
The cyber-attack on Ukraine power centers last December — an event that took 30 substations offline and left more than 230,000 residents without power — was a rude awakening for operators worldwide
Five pitfalls to avoid when building your insider risk program
Despite continued investments in security measures to control and monitor access to sensitive data, more organizations feel vulnerable to breaches caused by insiders
Vicious to virtuous: using analysis to create an effective cyber defense
An evolving threat landscape, persistent adversaries, and a shortage of talent and skills are some of the reasons security teams struggle to successfully defend their organizations.
Assess, transition and refine your cyber posture
Massive cyberattacks are occurring with greater frequency. In response, it is imperative for all organisations to assess their cyber posture and risk tolerance.
Meeting the challenges of an uncertain world: An interview with CEO Roger Krone
After nearly 50 years of tackling the world’s most complex problems — addressing challenges in the defense, intelligence, civil and health care markets — Krone still sees blue skies ahead for Leidos.
Advanced situational awareness for ICS management
At the Black Hat 2017 conference in Las Vegas, Leidos gave a sneak peek at a new product for critical infrastructure customers—Arena Asset Visibility and Insights (AVI). The product’s...
Securing Government against tomorrow’s threats: an interview with Leidos CIO, Steve Hull
Steve speaks with Federal News Radio on how Leidos does its cybersecurity and then derives lessons that can be applied to the federal government.
What does Leidos do? Part 8: Cyber
At Leidos, cyber is a broad term that includes offensive cyber, defensive cyber and regulatory compliance. To learn more, we spoke with Paul Butterfoss, the organization's technical lead in this area.
Dos and don’ts for building an effective ICS security program
For security teams, monitoring the security status of an IT network is common practice, while the routers, switches, and gateways of industrial networks go largely unchecked. Fortunately, this is...
The Cyber Workforce, Part 4: Successful candidates aren't one-size-fits-all
Even though it’s a highly technical field in many aspects, cybersecurity has several elements that lend themselves toward people from many different backgrounds.
#Innovidual Bill Brennan
We’re a company full of innovative individuals, or as we call them, #innoviduals. This week’s #innovidual is Bill Brennan, our Senior Director of Global Information Security.
Rapid growth through integration yields #1 spot as fastest growing cybersecurity consulting company
Successful integration, motivated leaders, and driven employees propel Leidos to the #1 fastest growing cybersecurity consulting company.
What does Leidos do? Part 2: Q&A with John Fratamico